Second release of the Framework expansion card adapter for Token2 T2F2 security keys. Now also supporting R3 devices.
https://codeberg.org/gerhard-tinned/Token2-Framework-ExpansionCard
Second release of the Framework expansion card adapter for Token2 T2F2 security keys. Now also supporting R3 devices.
https://codeberg.org/gerhard-tinned/Token2-Framework-ExpansionCard
Published another Article about FIDO2 hardware security keys. This is a bit of a critical view.
https://blog.tinned-software.net/security-keys-and-open-source/
I came across Headlines trying to introduce fear of #FIDO2.
"Using MITM to bypass FIDO2 phishing-resistant protection" and "Passwordless Authentication Standard FIDO2 Flaw Let Attackers Launch MITM Attacks" seem very frightening. So I took a closer look into those articles.
https://www.silverfort.com/blog/using-mitm-to-bypass-fido2/
https://gbhackers.com/fid02-mitm-vulnerability/
They seem very much identical down to the fact they use the same illustrations. My understanding is that the demonstrated "#MITM #Attack" is actually an attack on the session coockie. So The idea is to let the #FIDO2 #Authentication take place uninterrupted and when successful, intercept the Session cockie when sent from the Relaying Party/Webserver to the client.
Maybe someone with a better understanding of the Standards can correct me but this attack looks to me as if it only attackls the session information which would be possible no mather what authentication would be used. In my understanding, secure session handling is a real thread but outside of the actual FIDO2 scope.
What do you think? Is it FIDO2 related? Or just a generic Session hijacking that happens to work besides others also with FIDO2 authentications?
I have just published my next article related to #fido #securitykeys and how they can be managed in the #commandline
https://blog.tinned-software.net/fido2-security-key-management-via-commandline/
What’s the fuss about #FIDO
https://blog.tinned-software.net/whats-the-fuss-about-fido/
This is the latest of my articles about the topic.
For decades, users have authenticated on systems with usernames and passwords. This method of authentication has not changed since the beginning of the Internet. As the Internet became a more hostile place and threats emerged, ...
https://blog.tinned-software.net/secure-authentication-and-how-it-changed-over-time/
#security #securitykey #securitykeys #fido #fido2 #totp #passkey